• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • ATU Home
  • Announcements
  • Facebook
  • Instagram
  • Feedback
  • OIS A-Z
  • Working From Home

Office of Information Systems

Arkansas Tech University

  • Who We Are
    • Mission Statement
    • Our Staff
    • Our Divisions
      • Enterprise Resources Applications and Services
      • Information Security
      • Infrastructure Systems and Services
        • Infrastructure Services
        • Network Services
      • Technology Learning Resources
        • Instructional Technology Services
        • RPL Technology Center
        • Course Management Systems
          • BBLearn Blog
      • Support Services
    • Contact Us
  • What We Offer
    • Resource Summary
    • Computer Labs
    • Software
    • Policies
    • Hardware/Software Purchasing
    • Computer Based Training
    • Unified Communications
  • Solutions
  • Online Support
    • Service Catalog
    • Submit a Ticket
  • Manage Account

January 22, 2024 2:58pm

Urgent Notification: Protect Yourself from Phishing Attacks

We are seeing a significant increase in phishing attacks targeting Arkansas Tech University and its students, faculty, and staff. It has come to our attention that cybercriminals are employing increasingly sophisticated methods to deceive individuals and gain unauthorized access to sensitive information.

Phishing attacks involve the use of deceptive emails, text messages, or websites to trick unsuspecting individuals into revealing confidential data, such as login credentials, financial details, or personal information. These cybercriminals often masquerade as reputable entities or individuals, making it difficult to differentiate their fraudulent communications from legitimate ones.

To safeguard Arkansas Tech’s security and protect your personal information, it is crucial that you remain vigilant and follow these essential guidelines:

  1. Be cautious with email attachments and links: Exercise extreme caution when opening attachments or clicking on links in emails, especially if they are unexpected, unfamiliar, or suspicious. Hover your cursor over links to verify their destination before clicking on them.  If the email seems too good to be true it probably is.  Verify before proceeding.
  2. Verify the sender’s credibility: Pay close attention to the email sender’s address and ensure it matches the known email addresses of trusted contacts. However, keep in mind that sophisticated attackers can spoof email addresses, so be cautious even if the sender appears legitimate.
  3. External Senders Warning: Any email sent from an outside source will have a warning at the top of the email.  If you see this warning be extra careful.  Use this warning as a method to determine if an email is legitimate.
  4. Compromised account: Compromised accounts are used to lure you into believing that the email is legitimate.  Be vigilant when clicking on links or giving out information.  Contact that user to make sure they sent that email.  They may be unaware that this is happening.
  5. Scrutinize email content: Look for red flags such as poor grammar, misspellings, unusual requests, or urgent demands for personal or financial information. Legitimate organizations typically do not request sensitive data via email.  
  6. Avoid providing sensitive information: Never share sensitive personal or financial information through email or on unfamiliar websites. Legitimate organizations will have secure methods for collecting such data.
  7. Never give out your username or password:  Never give your username or password to a third party.  Be wary of using your username or password in a website that you access when clicking on a link in an email.  These are often fake websites that are set up to get your login information. 
  8. Never give out your Duo code:  Never provide your Duo two factor authentication code to anyone.  Never blindly approve a login request in Duo.  You may be giving access to a cybercriminal.
  9. Keep software and security systems up to date: Regularly update your computers operating system, web browsers, and security software to ensure you have the latest protection against potential vulnerabilities. 
  10. Report suspicious activity: If you encounter a suspicious email, website, or any potential security breach, report it to Campus Support immediately.  It is better to wait and verify the authenticity of an email before clicking on any links.

Remember, your vigilance and adherence to these guidelines are crucial in maintaining the security of Arkansas Tech’s data and protecting all faculty, staff, and students from phishing attacks.

If you have any questions or concerns regarding this matter, please do not hesitate to reach out to Campus Support by phone at 479-968-0646, or by email at campussupport@atu.edu or the security department at security@atu.edu. Together, we can combat these cyber threats and maintain a secure environment for all. 

Article by Angela Linden / Announcement, Data Security Awareness, Notification, Security

Footer

CAMPUS SUPPORT CENTER

RPL 150
(479) 968-0646 (call)
(479) 348-2436 (text)
campussupport@atu.edu

Hours of Operation - Spring 2025
Monday-Wednesday: 7am–10pm
Thursday-Friday: 7am-7pm
Saturday-Sunday: 2pm-6pm

 

Quick Links

  • Blackboard Learn
  • Dell Discounts
  • Equipment Removal
  • Feedback

Quick Links 2

  • InfoSec
  • Solutions
  • Manage Account

Quick Links 3

  • Office 365
  • OneTech
  • Online Training
  • Phishing

Quick Links 4

  • Policies
  • Purchasing
  • Security Awareness
  • Software Request
  • TeamViewer

ATU Logo

© Copyright 2020 Arkansas Tech University · All Rights Reserved · Website Accessibility